0% found this document useful (0 votes)
4 views

Internet Protocols

project by ansh

Uploaded by

Ansh Chaudhari
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Internet Protocols

project by ansh

Uploaded by

Ansh Chaudhari
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

“Internet Protocols”

Summer Vacation Assignment:2024-25

Submitted By : Submitted To:


Ansh Chaudhari Mr. Manish Kumar
Class: 10th I PGT Computer Science

1
Contents

Introduction Page No.

TCP/IP 4

SMTP 5

POP3 6

HTTP 7

HTTPS 8

SSH 9

SFTP 10

FTP 11

SCP 12

TELNET 13

2
INTRODUCTION TO INTER PROTOCOLS(IP)

The Internet Protocol (IP) is a set of requirements for addressing and routing
data on the Internet. IP can be used with several transport protocols, including
TCP and UDP.

The Internet Protocol (IP) is a protocol, or set of rules, for routing and
addressing packets of data so that they can travel across networks and
arrive at the correct destination. Data traversing the Internet is divided into
smaller pieces, called Packets. IP information is attached to each packet,
and this information helps routers to send packets to the right place.

Once the packets arrive at their destination, they are handled differently
depending on which transport protocol is used in combination with IP. The
most common transport protocols are TCP and UDP.

An IP address is a unique identifier assigned to a device or domain that


connects to the Internet. Each IP address is a series of characters, such as
'192.168.1.1'. Via DNS resolvers, which translate human-readable domain
names into IP addresses, users are able to access websites without
memorizing this complex series of characters.

3
TCP/IP

(Transmission Control Protocol/Internet Protocol)

The Transmission Control Protocol (TCP) is a transport protocol, meaning it dictates the
way data is sent and received. A TCP header is included in the data portion of each
packet that uses TCP/IP. Before transmitting data, TCP opens a connection with the
recipient. TCP ensures that all packets arrive in order once transmission begins. Via TCP,
the recipient will acknowledge receiving each packet that arrives. Missing packets will
be sent again if receipt is not acknowledged.

TCP is designed for reliability, not speed. Because TCP has to make sure all packets
arrive in order, loading data via TCP/IP can take longer if some packets are missing.

TCP and IP were originally designed to be used together, and these are often referred
to as the TCP/IP suite. However, other transport protocols can be used with IP.

The main work of TCP/IP is to transfer the data of a computer from one device to
another. The main condition of this process is to make data reliable and accurate so
that the receiver will receive the same information which is sent by the sender. To
ensure that, each message reaches its final destination accurately, the TCP/IP model
divides its data into packets and combines them at the other end, which helps in
maintaining the accuracy of the data while transferring from one end to another end .

Layers of TCP/IP Model

1. Application Layer
2. Transport Layer(TCP/UDP)
3. Network/Internet Layer(IP)
4. Data Link Layer (MAC)
5. Physical Layer

4
SMTP
(Simple Mail Transfer Protocol)

SMTP is an application layer protocol. The client who wants to send the mail opens
a TCP connection to the SMTP server and then sends the mail across the
connection. The SMTP server is an always-on listening mode. As soon as it listens
for a TCP connection from any client, the SMTP process initiates a connection
through port 25. After successfully establishing a TCP connection the client
process sends the mail instantly.

The SMTP model is of two types:

• End-to-End Method
• Store-and-Forward Method

The end-to-end model is used to communicate between different organizations whereas


the store and forward method is used within an organization. An SMTP client who wants
to send the mail will contact the destination’s host SMTP directly, to send the mail to the
destination. The SMTP server will keep the mail to itself until it is successfully copied to
the receiver’ SMTP.

The client SMTP is the one that initiates the session so let us call it the client-
SMTP and the server SMTP is the one that responds to the session request
so let us call it receiver-SMTP. The client-SMTP will start the session and the
receiver SMTP will respond to the request.

Commands HELO: Identifies the client to the server, fully qualified domain
name, only sent once per session.
5
POP3
(POST OFFICE PROTOCOL
VERSION 3)

POP3 is an older protocol that was originally designed to be used on only one computer. POP
3 stands for Post Office Protocol Version 3. POP3 protocol is used to provide access to the
mail inbox that is stored in the email server. POP3 protocol can download and delete
messages. Once the POP3 client has established a connection with the mail server it can
easily retrieve all the messages from the server. The user can access the messages locally
even if the user is offline. Every time the client needs to check manually for new messages
as POP3 Protocol provides the feature of real-time synchronization. Various email
applications such as Microsoft Outlook, Apple Mail, Gmail supports POP3 protocol.

When a message is sent, SMPT is used to transfer it from the client to the server and
ultimately to the server of the recipient. However, the Message Access Agent facilitates the
transmission of the message from the receiving server to the host server. POP3 and IMAP
are the two types of protocols that are included in the Message Access Agent.

POP3 makes use of two network ports. They are:

Port 110: Port 110 is a default TCP port used by POP3. But It has a disadvantage that it
does not support encrypted communication.

Port 995: Port 995 is majorly used for more secure applications. Port 995 is
a TLS or SSL port used to provide more security.

The POP3 protocol was created by the engineers as a straightforward and efficient email
protocol that is used to retrieve emails from the server. Instead of accessing the mailbox
offline, this offers the option to access the mails offline.

The POP3 protocol was developed with the fundamental idea that when a client and a server
retrieve mail, it goes through three stages. This is true even if the protocol has experienced
many improvements. They made an effort to keep this protocol as simple as possible, and
because of its simplicity, it is now widely used.
6
HTTP
(HYPER TEXT TRANSFER PROTOCOL)

o HTTP stands for Hyper Text Transfer Protocol.


o It is a protocol used to access the data on the World Wide Web (www).
o The HTTP protocol can be used to transfer the data in the form of plain text, hypertext, audio,
video, and so on.
o This protocol is known as Hyper Text Transfer Protocol because of its efficiency that allows us to
use in a hypertext environment where there are rapid jumps from one document to another
document.
o HTTP is similar to the FTP as it also transfers the files from one host to another host. But, HTTP
is simpler than FTP as HTTP uses only one connection, i.e., no control connection to transfer the
files.
o HTTP is used to carry the data in the form of MIME-like format.
o HTTP is similar to SMTP as the data is transferred between client and server. The HTTP differs
from the SMTP in the way the messages are sent from the client to the server and from server to
the client. SMTP messages are stored and forwarded while HTTP messages are delivered
immediately.

Features of HTTP:
o Connectionless protocol: HTTP is a connectionless protocol. HTTP client initiates a request and
waits for a response from the server. When the server receives the request, the server processes
the request and sends back the response to the HTTP client after which the client disconnects the
connection. The connection between client and server exist only during the current request and
response time only.
o Media independent: HTTP protocol is a media independent as data can be sent as long as both
the client and server know how to handle the data content. It is required for both the client and
server to specify the content type in MIME-type header.
o Stateless: HTTP is a stateless protocol as both the client and server know each other only during
the current request. Due to this nature of the protocol, both the client and server do not retain the
information between various requests of the web pages.

7
HTTPS
(HYPER TEXT TRANSFER PROTOCOL SECURE)

HTTPS is an abbreviation of Hypertext Transfer Protocol Secure. It is a secure


extension or version of HTTP. This protocol is mainly used for providing security to the
data sent between a website and the web browser. It is widely used on the internet and
used for secure communications. This protocol uses the 443 port number for
communicating the data.

This protocol is also called HTTP over SSL because the HTTPS communication
protocols are encrypted using the SSL (Secure Socket Layer).

By default, it is supported by various web browsers.

Those websites which need login credentials should use the HTTPS protocol for
sending the data.

It allows users to create a secured encrypted connection and helps them to protect
their information from being stolen.

Hypertext Transfer Protocol Secure is a protocol that is used to communicate


between the user browser and the website. It also helps in the transfer of data. It is
the secure variant of HTTP. To make the data transfer more secure, it is encrypted.
Encryption is required to ensure security while transmitting sensitive information like
passwords, contact information, etc.

HTTPS establishes the communication between the browser and the web server. It
uses the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocol for
establishing communication. The new version of SSL is TLS (Transport Layer
Security).
HTTPS uses the conventional HTTP protocol and adds a layer of SSL/TLS over it.
The workflow of HTTP and HTTPS remains the same, the browsers and servers still
communicate with each other using the HTTP protocol. However, this is done over a
secure SSL connection. The SSL connection is responsible for the encryption and
decryption of the data that is being exchanged to ensure data safety.
8
SSH (SECURE SHELL)

To provide security between a client and a server the SSH protocol uses encryption.
All user authentication and file transfers are encrypted to protect the network against
attacks.

SSH stands for Secure Shell or Secure Socket Shell. It is a cryptographic network protocol that allows
two computers to communicate and share the data over an insecure network such as the internet. It is
used to login to a remote server to execute commands and data transfer from one machine to another
machine.

The SSH protocol was developed by SSH communication security Ltd to safely communicate with the
remote machine.

Secure communication provides a strong password authentication and encrypted communication with
a public key over an insecure channel. It is used to replace unprotected remote login protocols such
as Telnet, rlogin, rsh, etc., and insecure file transfer protocol FTP.

Its security features are widely used by network administrators for managing systems and applications
remotely.

The SSH protocol protects the network from various attacks such as DNS spoofing, IP source routing,
and IP spoofing.

A simple example can be understood; such as suppose you want to transfer a package to one of your
friends. Without SSH protocol, it can be opened and read by anyone. But if you will send it using SSH
protocol, it will be encrypted and secured with the public keys, and only the receiver can open it.

The SSH protocol works in a client-server model, which means it connects a secure shell client
application (End where the session is displayed) with the SSH server (End where session executes).

As discussed above, it was initially developed to replace insecure login protocols such as Telnet, rlogin,
and hence it performs the same function.
9
SFTP
(SECURE FILE TRANSFER PROTOCOL)

Secure File Transfer Protocol (SFTP) is a network protocol that enables


secure and encrypted file transfers between a client and a server. It is
designed to provide a secure alternative to the traditional File Transfer
Protocol (FTP) by incorporating Secure Shell (SSH) for authentication and
data encryption.

SFTP (Secure File Transfer Protocol) is the advanced version of FTP(file


transfer protocol) which ensures security while transferring files between
the organizations/computer. It is also known as SSH(Secure Shell). It
works on port no. 22 and uses the client-server model.

Features of SFTP :

• It encrypts the data.


• It executes the command.
• It secures and compresses the data for transmission.
• It provides authentication to username and password.
• It improves uploading and downloading files functionality.
• It also provides authentication to the public key.
Working :
SFTP ensures data security by applying SSH Message Authentication Code(MAC) to
data packets. Firstly, a safe and secure connection is established by SFTP then it
provides an advanced level of protection for data transferring. The authentication of
users to the file being shared on SSH data stream, everything is encrypted by SFTP.
If any unauthorized person or third party tries to access the data, it will be
incomprehensible or unreadable due to encryption.

For example– In WhatsApp, Messages are end to end encrypted.

10
FTP
(FILE TRANSFER PROTOCOL)

FTP (File Transfer Protocol) is a standard network protocol used for the
transfer of files from one host to another over a TCP-based network, such
as the Internet. FTP works by opening two connections that link the
computers trying to communicate with each other. File Transfer
Protocol(FTP) is an application layer protocol that moves files between
local and remote file systems. It runs on top of TCP, like HTTP. To transfer
a file, 2 TCP connections are used by FTP in parallel: control connection
and data connection.
FTP is a standard communication protocol. There are various other
protocols like HTTP which are used to transfer files between computers,
but they lack clarity and focus as compared to FTP. Moreover, the
systems involved in connection are heterogeneous, i.e. they differ in
operating systems, directories, structures, character sets, etc the FTP
shields the user from these differences and transfers data efficiently and
reliably. FTP can transfer ASCII, EBCDIC, or image files. The ASCII is the
default file share format, in this, each character is encoded by NVT ASCII.
In ASCII or EBCDIC the destination must be ready to accept files in this
mode. The image file format is the default format for transforming binary
files.

Types of FTP
• Anonymous FTP: Anonymous FTP is enabled on some sites whose files are
available for public access. A user can access these files without having any
username or password. Instead, the username is set to anonymous, and the
password is to the guest by default. Here, user access is very limited. For
example, the user can be allowed to copy the files but not to navigate through
directories.
• Password Protected FTP: This type of FTP is similar to the previous one, but the
change in it is the use of username and password.
• FTP Secure (FTPS): It is also called as FTP Secure Sockets Layer (FTP SSL). It is
a more secure version of FTP data transfer. Whenever FTP connection is
established, Transport Layer Security (TLS) is enabled.
11
SCP (SECURE COPY PROTOCOL)

Secure copy protocol (SCP) is a means of securely transferring computer


files between a local host and a remote host or between two remote hosts.
It is based on the Secure Shell (SSH) protocol. The Secure Copy Protocol,
or SCP, is a file transfer network protocol used to move files onto servers,
and it fully supports encryption and authentication. SCP uses Secure Shell
(SSH) mechanisms for data transfer and authentication to ensure the
confidentiality of the data in transit.
The SCP client can easily upload files to an SSH server or request files and
directories for downloading. Then, the server sends all the subdirectories
and the files that are available for download. The server controls the file
downloads for security risks if the client is unintentionally connected to a
malicious server. SCP is in fact a native command in most operating
systems, such as mac OS, Windows, or Linux.

Advantages & Disadvantages of SCP


The major drawback to SCP is that it can only transfer files and is not as
complete a process as other protocols. It’s major advantages are its robust
security

Status and Popularity

Although SCP can only transfer files, it can do it significantly faster than
SFTP.

12
TELNET (TELETYPE NETWORK)

TELNET stands for Teletype Network. It is a type of protocol that enables one
computer to connect to the local computer. It is used as a standard TCP/IP protocol for
virtual terminal service which is provided by ISO. The computer which starts the
connection is known as the local computer.
The computer which is being connected to i.e. which accepts the connection known as
the remote computer.
During telnet operation, whatever is being performed on the remote computer will be
displayed by the local computer. Telnet operates on a client/server principle. The local
computer uses a telnet client program and the remote computers use a telnet server
program.
TELNET Commands
Commands of Telnet are identified by a prefix character, Interpret as
Command (IAC) with code 255. IAC is followed by command and option
codes.
The basic format of the command is as shown in the following figure:

Advantages of Telnet
1. It provides remote access to someone’s computer system.
2. Telnet allows the user for more access with fewer problems in data transmission.
3. Telnet saves a lot of time.
Disadvantages of Telnet
1. As it is somehow complex, it becomes difficult to beginners in understanding.
2. Data is sent here in form of plain text, that’s why it is not so secured.
3. Some capabilities are disabled because of not proper interlinking of the remote and
local devices.

13
THANK YOU

14

You might also like